Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
31-01-2023 13:12
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
271KB
-
MD5
e3a576fda3253b1f5e57734e1d1d30ec
-
SHA1
4da98990e681a5c9ea026960ca0150582088173d
-
SHA256
2e919dbaca46898116a0aa387553a54f4711aea584ea9931e6ea49d89e8986b8
-
SHA512
46a9280eff90efecb485ff491d43ae4ee62ac2e0ca2a0364b4749c1a4bf60bd49ed7d4dd2c1b9a9aa25e448776e5d172591b5df333c3965af7147631123ce64b
-
SSDEEP
6144:/Ya6x5gt3OupNIRztp3FXl50iIj74HtMJh9plSNqw7mPONATWEsbSDYv:/YDSt3OX95l5uj8NMJZlSz7mPOO4SDE
Malware Config
Extracted
formbook
4.1
w12e
poshsalon.co.uk
ideeksha.net
eaglebreaks.com
exileine.me.uk
saveittoday.net
ceon.tech
estateagentswebsitedesign.uk
faropublicidade.com
depression-treatment-83678.com
informationdata16376.com
wirecreations.africa
coolsculpting-pros.life
ethoshabitats.com
amtindividual.com
gotoken.online
cherny-100-imec-msu.ru
historicaarcanum.com
gpsarhealthcare.com
kx1257.com
abdullahbinomar.com
utrem.xyz
khangkiencharcoal.com
fabvance-demos.online
jima68.com
1206b.com
guardianshipattorneyhouston.com
imziii.com
gaya-zohar.com
affluencegroup.net
xn--l3cj0azbal8cf5kobm.net
apogeebk.com
kwaranewsupdate.africa
buatosh.top
thenextlevelup.net
kristianstadspelforening.se
excertesi.com
swcctv.co.uk
actiontoyhouse.com
eisenhowerloan.com
brightupproduce.com
lojaedesign.com
kecheblog.com
vigilant-e.africa
internationaltaekwondo.net
annabenedetto.com
eboomp.pics
groupeverlaine.app
ebwwn.com
grasshopperspirit.online
getsafu.com
car-deals-75816.com
roddgunnstore.online
aiako.pro
homasp.club
bingo1818.xyz
work2050.co.uk
itgroup1.online
beyou-us.com
forthewitches.biz
felue.com
macroapi.net
hsfinancialservice.com
eoresla.club
alloahucondos.com
hkifarm.com
Signatures
-
Formbook payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4184-139-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/4184-144-0x0000000000400000-0x000000000042F000-memory.dmp formbook behavioral2/memory/3228-147-0x0000000000920000-0x000000000094F000-memory.dmp formbook behavioral2/memory/3228-151-0x0000000000920000-0x000000000094F000-memory.dmp formbook -
Executes dropped EXE 2 IoCs
Processes:
uytjxhzdd.exeuytjxhzdd.exepid process 4120 uytjxhzdd.exe 4184 uytjxhzdd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
uytjxhzdd.exeuytjxhzdd.exeNETSTAT.EXEdescription pid process target process PID 4120 set thread context of 4184 4120 uytjxhzdd.exe uytjxhzdd.exe PID 4184 set thread context of 3052 4184 uytjxhzdd.exe Explorer.EXE PID 3228 set thread context of 3052 3228 NETSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 3228 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
uytjxhzdd.exeNETSTAT.EXEpid process 4184 uytjxhzdd.exe 4184 uytjxhzdd.exe 4184 uytjxhzdd.exe 4184 uytjxhzdd.exe 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE 3228 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3052 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
uytjxhzdd.exeuytjxhzdd.exeNETSTAT.EXEpid process 4120 uytjxhzdd.exe 4184 uytjxhzdd.exe 4184 uytjxhzdd.exe 4184 uytjxhzdd.exe 3228 NETSTAT.EXE 3228 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
uytjxhzdd.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 4184 uytjxhzdd.exe Token: SeDebugPrivilege 3228 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
file.exeuytjxhzdd.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 1060 wrote to memory of 4120 1060 file.exe uytjxhzdd.exe PID 1060 wrote to memory of 4120 1060 file.exe uytjxhzdd.exe PID 1060 wrote to memory of 4120 1060 file.exe uytjxhzdd.exe PID 4120 wrote to memory of 4184 4120 uytjxhzdd.exe uytjxhzdd.exe PID 4120 wrote to memory of 4184 4120 uytjxhzdd.exe uytjxhzdd.exe PID 4120 wrote to memory of 4184 4120 uytjxhzdd.exe uytjxhzdd.exe PID 4120 wrote to memory of 4184 4120 uytjxhzdd.exe uytjxhzdd.exe PID 3052 wrote to memory of 3228 3052 Explorer.EXE NETSTAT.EXE PID 3052 wrote to memory of 3228 3052 Explorer.EXE NETSTAT.EXE PID 3052 wrote to memory of 3228 3052 Explorer.EXE NETSTAT.EXE PID 3228 wrote to memory of 880 3228 NETSTAT.EXE cmd.exe PID 3228 wrote to memory of 880 3228 NETSTAT.EXE cmd.exe PID 3228 wrote to memory of 880 3228 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exe"C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exe" C:\Users\Admin\AppData\Local\Temp\cjfqwq.l3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exe"C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\cjfqwq.lFilesize
5KB
MD5880b21b90e22befd4df0d80aba7ff644
SHA1ebc3d261dc7b28d440786da3a1713f2e10beba5e
SHA2565ef221dc3ae4d47c1f069885b8e6ffce7531bfa772a6d67d23f92da1afa142c6
SHA51213005bfa2abe5fe93d7400b806dcf6521b47ea3e93c88f356cc00a249b3fad68ec75541a9f565c5b0652c6f62dcce0bc3c85f4a3e80295775411a211b7ad8b78
-
C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exeFilesize
75KB
MD57ba3704321ad41d32538052ff873a680
SHA1c32751f91d47369c68a0d2c974b03a21c1d10f05
SHA2566b61580c129877c0ea92647800d963854e3289557220136c23ddb3924619b9a3
SHA512ecec4b75f28d0461dcd13cacc6bead72b1e500edfb4ce95bab66a3db15e2427f9a11762db1828836f5368ce12459ce40f8232b140bebdec7a6053427e484b703
-
C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exeFilesize
75KB
MD57ba3704321ad41d32538052ff873a680
SHA1c32751f91d47369c68a0d2c974b03a21c1d10f05
SHA2566b61580c129877c0ea92647800d963854e3289557220136c23ddb3924619b9a3
SHA512ecec4b75f28d0461dcd13cacc6bead72b1e500edfb4ce95bab66a3db15e2427f9a11762db1828836f5368ce12459ce40f8232b140bebdec7a6053427e484b703
-
C:\Users\Admin\AppData\Local\Temp\uytjxhzdd.exeFilesize
75KB
MD57ba3704321ad41d32538052ff873a680
SHA1c32751f91d47369c68a0d2c974b03a21c1d10f05
SHA2566b61580c129877c0ea92647800d963854e3289557220136c23ddb3924619b9a3
SHA512ecec4b75f28d0461dcd13cacc6bead72b1e500edfb4ce95bab66a3db15e2427f9a11762db1828836f5368ce12459ce40f8232b140bebdec7a6053427e484b703
-
C:\Users\Admin\AppData\Local\Temp\wndad.eFilesize
205KB
MD5aa76268a5e3f86543d2713c18055d0b0
SHA15034b6a8301d6733d5f96697a894119ec3b241e0
SHA25635d310bc108289db31f597e661ed8c7ed1c6acde491c013cbc386ab9088ded2f
SHA512e879fd4bba33faa3c638f0b510551acc397a2ae3a5ad41c59abc3e03840f9603bc80996c885ea34bb367088a2da098d79f4e9bc84ab71de78479689d8bc9da53
-
memory/880-145-0x0000000000000000-mapping.dmp
-
memory/3052-142-0x0000000008290000-0x00000000083E8000-memory.dmpFilesize
1.3MB
-
memory/3052-152-0x0000000002D90000-0x0000000002E2B000-memory.dmpFilesize
620KB
-
memory/3052-150-0x0000000002D90000-0x0000000002E2B000-memory.dmpFilesize
620KB
-
memory/3228-146-0x0000000000320000-0x000000000032B000-memory.dmpFilesize
44KB
-
memory/3228-143-0x0000000000000000-mapping.dmp
-
memory/3228-147-0x0000000000920000-0x000000000094F000-memory.dmpFilesize
188KB
-
memory/3228-148-0x0000000001280000-0x00000000015CA000-memory.dmpFilesize
3.3MB
-
memory/3228-149-0x00000000010C0000-0x0000000001153000-memory.dmpFilesize
588KB
-
memory/3228-151-0x0000000000920000-0x000000000094F000-memory.dmpFilesize
188KB
-
memory/4120-132-0x0000000000000000-mapping.dmp
-
memory/4184-141-0x00000000005E0000-0x00000000005F4000-memory.dmpFilesize
80KB
-
memory/4184-144-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4184-140-0x0000000000A60000-0x0000000000DAA000-memory.dmpFilesize
3.3MB
-
memory/4184-139-0x0000000000400000-0x000000000042F000-memory.dmpFilesize
188KB
-
memory/4184-137-0x0000000000000000-mapping.dmp